Index: net/http/http_mac_signature.cc |
diff --git a/net/http/http_mac_signature.cc b/net/http/http_mac_signature.cc |
deleted file mode 100644 |
index e445165ef200bb9697324a4112916bead2d879fe..0000000000000000000000000000000000000000 |
--- a/net/http/http_mac_signature.cc |
+++ /dev/null |
@@ -1,181 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/http/http_mac_signature.h" |
- |
-#include "base/base64.h" |
-#include "base/rand_util.h" |
-#include "base/string_number_conversions.h" |
-#include "base/string_util.h" |
-#include "crypto/hmac.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-const char kSHA1Name[] = "hmac-sha-1"; |
-const char kSHA256Name[] = "hmac-sha-256"; |
-const int kNonceLength = 64/8; |
- |
-bool IsPlainStringCharacter(char character) { |
- return character == 0x20 || character == 0x21 || |
- (character >= 0x23 && character <= 0x5B) || |
- (character >= 0x5D && character <= 0x7E); |
-} |
- |
-bool IsPlainString(const std::string& string) { |
- for (size_t i = 0; i < string.size(); ++i) { |
- if (!IsPlainStringCharacter(string[i])) |
- return false; |
- } |
- return true; |
-} |
- |
-std::string GenerateNonce() { |
- std::string nonce; |
- bool result = base::Base64Encode( |
- base::RandBytesAsString(kNonceLength), &nonce); |
- DCHECK(result); |
- return nonce; |
-} |
- |
-} |
- |
-HttpMacSignature::HttpMacSignature() |
- : mac_algorithm_(crypto::HMAC::SHA1) { |
-} |
- |
-HttpMacSignature::~HttpMacSignature() { |
-} |
- |
-bool HttpMacSignature::AddStateInfo(const std::string& id, |
- const base::Time& creation_date, |
- const std::string& mac_key, |
- const std::string& mac_algorithm) { |
- DCHECK(id_.empty()); |
- |
- if (!IsPlainString(id) || id.empty() || |
- creation_date.is_null() || |
- mac_key.empty() || |
- mac_algorithm.empty()) { |
- return false; |
- } |
- |
- if (mac_algorithm == kSHA1Name) |
- mac_algorithm_ = crypto::HMAC::SHA1; |
- else if (mac_algorithm == kSHA256Name) |
- mac_algorithm_ = crypto::HMAC::SHA256; |
- else |
- return false; |
- |
- id_ = id; |
- creation_date_ = creation_date; |
- mac_key_ = mac_key; |
- return true; |
-} |
- |
-bool HttpMacSignature::AddHttpInfo(const std::string& method, |
- const std::string& request_uri, |
- const std::string& host, |
- int port) { |
- DCHECK(method_.empty()); |
- |
- if (!IsPlainString(method) || method.empty() || |
- !IsPlainString(request_uri) || request_uri.empty() || |
- !IsPlainString(host) || host.empty() || |
- port <= 0 || port > 65535) { |
- return false; |
- } |
- |
- method_ = StringToUpperASCII(method); |
- request_uri_ = request_uri; |
- host_ = StringToLowerASCII(host); |
- port_ = base::IntToString(port); |
- return true; |
-} |
- |
-bool HttpMacSignature::GenerateAuthorizationHeader(std::string* header) { |
- if (id_.empty()) { |
- NOTREACHED() << "Call AddStateInfo first."; |
- return false; |
- } |
- if (method_.empty()) { |
- NOTREACHED() << "Call AddHttpInfo first."; |
- return false; |
- } |
- |
- std::string age = base::Int64ToString( |
- (base::Time::Now() - creation_date_).InSeconds()); |
- std::string nonce = GenerateNonce(); |
- |
- return GenerateHeaderString(age, nonce, header); |
-} |
- |
-bool HttpMacSignature::GenerateHeaderString(const std::string& age, |
- const std::string& nonce, |
- std::string* header) { |
- std::string mac; |
- if (!GenerateMAC(age, nonce, &mac)) |
- return false; |
- |
- DCHECK(IsPlainString(age)); |
- DCHECK(IsPlainString(nonce)); |
- DCHECK(IsPlainString(mac)); |
- |
- *header = "MAC id=\"" + id_ + |
- "\", nonce=\"" + age + ":" + nonce + |
- "\", mac=\"" + mac + "\""; |
- return true; |
-} |
- |
-std::string HttpMacSignature::GenerateNormalizedRequest( |
- const std::string& age, |
- const std::string& nonce) { |
- const std::string kNewLine = "\n"; |
- |
- std::string normalized_request = age + ":" + nonce + kNewLine; |
- normalized_request += method_ + kNewLine; |
- normalized_request += request_uri_ + kNewLine; |
- normalized_request += host_ + kNewLine; |
- normalized_request += port_ + kNewLine; |
- normalized_request += kNewLine; |
- normalized_request += kNewLine; |
- |
- return normalized_request; |
-} |
- |
-bool HttpMacSignature::GenerateMAC(const std::string& age, |
- const std::string& nonce, |
- std::string* mac) { |
- std::string request = GenerateNormalizedRequest(age, nonce); |
- |
- crypto::HMAC hmac(mac_algorithm_); |
- if (!hmac.Init(mac_key_)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- std::string signature; |
- size_t length = hmac.DigestLength(); |
- DCHECK_GT(length, 0u); |
- if (!hmac.Sign(request, |
- // We need the + 1 here not because the call will write a trailing \0, |
- // but so that signature.length() is correctly set to |length|. |
- reinterpret_cast<unsigned char*>(WriteInto(&signature, length + 1)), |
- length)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- std::string encoded_signature; |
- if (!base::Base64Encode(signature, &encoded_signature)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- mac->swap(encoded_signature); |
- return true; |
-} |
- |
-} // namespace net |